Mod.cs 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608
  1. #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
  2. #pragma warning disable
  3. using System;
  4. using System.Diagnostics;
  5. using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities;
  6. using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
  7. using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
  8. namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Math.Raw
  9. {
  10. /*
  11. * Modular inversion as implemented in this class is based on the paper "Fast constant-time gcd
  12. * computation and modular inversion" by Daniel J. Bernstein and Bo-Yin Yang.
  13. */
  14. internal abstract class Mod
  15. {
  16. private static readonly SecureRandom RandomSource = new SecureRandom();
  17. private const int M30 = 0x3FFFFFFF;
  18. private const ulong M32UL = 0xFFFFFFFFUL;
  19. public static void CheckedModOddInverse(uint[] m, uint[] x, uint[] z)
  20. {
  21. if (0 == ModOddInverse(m, x, z))
  22. throw new ArithmeticException("Inverse does not exist.");
  23. }
  24. public static void CheckedModOddInverseVar(uint[] m, uint[] x, uint[] z)
  25. {
  26. if (!ModOddInverseVar(m, x, z))
  27. throw new ArithmeticException("Inverse does not exist.");
  28. }
  29. public static uint Inverse32(uint d)
  30. {
  31. Debug.Assert((d & 1) == 1);
  32. //int x = d + (((d + 1) & 4) << 1); // d.x == 1 mod 2**4
  33. uint x = d; // d.x == 1 mod 2**3
  34. x *= 2 - d * x; // d.x == 1 mod 2**6
  35. x *= 2 - d * x; // d.x == 1 mod 2**12
  36. x *= 2 - d * x; // d.x == 1 mod 2**24
  37. x *= 2 - d * x; // d.x == 1 mod 2**48
  38. Debug.Assert(d * x == 1);
  39. return x;
  40. }
  41. public static uint ModOddInverse(uint[] m, uint[] x, uint[] z)
  42. {
  43. int len32 = m.Length;
  44. Debug.Assert(len32 > 0);
  45. Debug.Assert((m[0] & 1) != 0);
  46. Debug.Assert(m[len32 - 1] != 0);
  47. int bits = (len32 << 5) - Integers.NumberOfLeadingZeros((int)m[len32 - 1]);
  48. int len30 = (bits + 29) / 30;
  49. int[] t = new int[4];
  50. int[] D = new int[len30];
  51. int[] E = new int[len30];
  52. int[] F = new int[len30];
  53. int[] G = new int[len30];
  54. int[] M = new int[len30];
  55. E[0] = 1;
  56. Encode30(bits, x, 0, G, 0);
  57. Encode30(bits, m, 0, M, 0);
  58. Array.Copy(M, 0, F, 0, len30);
  59. int eta = -1;
  60. int m0Inv32 = (int)Inverse32((uint)M[0]);
  61. int maxDivsteps = GetMaximumDivsteps(bits);
  62. for (int divSteps = 0; divSteps < maxDivsteps; divSteps += 30)
  63. {
  64. eta = Divsteps30(eta, F[0], G[0], t);
  65. UpdateDE30(len30, D, E, t, m0Inv32, M);
  66. UpdateFG30(len30, F, G, t);
  67. }
  68. int signF = F[len30 - 1] >> 31;
  69. CNegate30(len30, signF, F);
  70. /*
  71. * D is in the range (-2.M, M). First, conditionally add M if D is negative, to bring it
  72. * into the range (-M, M). Then normalize by conditionally negating (according to signF)
  73. * and/or then adding M, to bring it into the range [0, M).
  74. */
  75. CNormalize30(len30, signF, D, M);
  76. Decode30(bits, D, 0, z, 0);
  77. Debug.Assert(0 != Nat.LessThan(len32, z, m));
  78. return (uint)(EqualTo(len30, F, 1) & EqualToZero(len30, G));
  79. }
  80. public static bool ModOddInverseVar(uint[] m, uint[] x, uint[] z)
  81. {
  82. int len32 = m.Length;
  83. Debug.Assert(len32 > 0);
  84. Debug.Assert((m[0] & 1) != 0);
  85. Debug.Assert(m[len32 - 1] != 0);
  86. int bits = (len32 << 5) - Integers.NumberOfLeadingZeros((int)m[len32 - 1]);
  87. int len30 = (bits + 29) / 30;
  88. int[] t = new int[4];
  89. int[] D = new int[len30];
  90. int[] E = new int[len30];
  91. int[] F = new int[len30];
  92. int[] G = new int[len30];
  93. int[] M = new int[len30];
  94. E[0] = 1;
  95. Encode30(bits, x, 0, G, 0);
  96. Encode30(bits, m, 0, M, 0);
  97. Array.Copy(M, 0, F, 0, len30);
  98. int clzG = Integers.NumberOfLeadingZeros(G[len30 - 1] | 1) - (len30 * 30 + 2 - bits);
  99. int eta = -1 - clzG;
  100. int lenDE = len30, lenFG = len30;
  101. int m0Inv32 = (int)Inverse32((uint)M[0]);
  102. int maxDivsteps = GetMaximumDivsteps(bits);
  103. int divsteps = 0;
  104. while (!IsZero(lenFG, G))
  105. {
  106. if (divsteps >= maxDivsteps)
  107. return false;
  108. divsteps += 30;
  109. eta = Divsteps30Var(eta, F[0], G[0], t);
  110. UpdateDE30(lenDE, D, E, t, m0Inv32, M);
  111. UpdateFG30(lenFG, F, G, t);
  112. int fn = F[lenFG - 1];
  113. int gn = G[lenFG - 1];
  114. int cond = (lenFG - 2) >> 31;
  115. cond |= fn ^ (fn >> 31);
  116. cond |= gn ^ (gn >> 31);
  117. if (cond == 0)
  118. {
  119. F[lenFG - 2] |= fn << 30;
  120. G[lenFG - 2] |= gn << 30;
  121. --lenFG;
  122. }
  123. }
  124. int signF = F[lenFG - 1] >> 31;
  125. /*
  126. * D is in the range (-2.M, M). First, conditionally add M if D is negative, to bring it
  127. * into the range (-M, M). Then normalize by conditionally negating (according to signF)
  128. * and/or then adding M, to bring it into the range [0, M).
  129. */
  130. int signD = D[lenDE - 1] >> 31;
  131. if (signD < 0)
  132. {
  133. signD = Add30(lenDE, D, M);
  134. }
  135. if (signF < 0)
  136. {
  137. signD = Negate30(lenDE, D);
  138. signF = Negate30(lenFG, F);
  139. }
  140. Debug.Assert(0 == signF);
  141. if (!IsOne(lenFG, F))
  142. return false;
  143. if (signD < 0)
  144. {
  145. signD = Add30(lenDE, D, M);
  146. }
  147. Debug.Assert(0 == signD);
  148. Decode30(bits, D, 0, z, 0);
  149. Debug.Assert(!Nat.Gte(len32, z, m));
  150. return true;
  151. }
  152. public static uint[] Random(uint[] p)
  153. {
  154. int len = p.Length;
  155. uint[] s = Nat.Create(len);
  156. uint m = p[len - 1];
  157. m |= m >> 1;
  158. m |= m >> 2;
  159. m |= m >> 4;
  160. m |= m >> 8;
  161. m |= m >> 16;
  162. do
  163. {
  164. byte[] bytes = new byte[len << 2];
  165. RandomSource.NextBytes(bytes);
  166. Pack.BE_To_UInt32(bytes, 0, s);
  167. s[len - 1] &= m;
  168. }
  169. while (Nat.Gte(len, s, p));
  170. return s;
  171. }
  172. private static int Add30(int len30, int[] D, int[] M)
  173. {
  174. Debug.Assert(len30 > 0);
  175. Debug.Assert(D.Length >= len30);
  176. Debug.Assert(M.Length >= len30);
  177. int c = 0, last = len30 - 1;
  178. for (int i = 0; i < last; ++i)
  179. {
  180. c += D[i] + M[i];
  181. D[i] = c & M30; c >>= 30;
  182. }
  183. c += D[last] + M[last];
  184. D[last] = c; c >>= 30;
  185. return c;
  186. }
  187. private static void CNegate30(int len30, int cond, int[] D)
  188. {
  189. Debug.Assert(len30 > 0);
  190. Debug.Assert(D.Length >= len30);
  191. int c = 0, last = len30 - 1;
  192. for (int i = 0; i < last; ++i)
  193. {
  194. c += (D[i] ^ cond) - cond;
  195. D[i] = c & M30; c >>= 30;
  196. }
  197. c += (D[last] ^ cond) - cond;
  198. D[last] = c;
  199. }
  200. private static void CNormalize30(int len30, int condNegate, int[] D, int[] M)
  201. {
  202. Debug.Assert(len30 > 0);
  203. Debug.Assert(D.Length >= len30);
  204. Debug.Assert(M.Length >= len30);
  205. int last = len30 - 1;
  206. {
  207. int c = 0, condAdd = D[last] >> 31;
  208. for (int i = 0; i < last; ++i)
  209. {
  210. int di = D[i] + (M[i] & condAdd);
  211. di = (di ^ condNegate) - condNegate;
  212. c += di; D[i] = c & M30; c >>= 30;
  213. }
  214. {
  215. int di = D[last] + (M[last] & condAdd);
  216. di = (di ^ condNegate) - condNegate;
  217. c += di; D[last] = c;
  218. }
  219. }
  220. {
  221. int c = 0, condAdd = D[last] >> 31;
  222. for (int i = 0; i < last; ++i)
  223. {
  224. int di = D[i] + (M[i] & condAdd);
  225. c += di; D[i] = c & M30; c >>= 30;
  226. }
  227. {
  228. int di = D[last] + (M[last] & condAdd);
  229. c += di; D[last] = c;
  230. }
  231. Debug.Assert(c >> 30 == 0);
  232. }
  233. }
  234. private static void Decode30(int bits, int[] x, int xOff, uint[] z, int zOff)
  235. {
  236. Debug.Assert(bits > 0);
  237. int avail = 0;
  238. ulong data = 0L;
  239. while (bits > 0)
  240. {
  241. while (avail < System.Math.Min(32, bits))
  242. {
  243. data |= (ulong)x[xOff++] << avail;
  244. avail += 30;
  245. }
  246. z[zOff++] = (uint)data; data >>= 32;
  247. avail -= 32;
  248. bits -= 32;
  249. }
  250. }
  251. private static int Divsteps30(int eta, int f0, int g0, int[] t)
  252. {
  253. int u = 1, v = 0, q = 0, r = 1;
  254. int f = f0, g = g0;
  255. for (int i = 0; i < 30; ++i)
  256. {
  257. Debug.Assert((f & 1) == 1);
  258. Debug.Assert((u * f0 + v * g0) == f << i);
  259. Debug.Assert((q * f0 + r * g0) == g << i);
  260. int c1 = eta >> 31;
  261. int c2 = -(g & 1);
  262. int x = (f ^ c1) - c1;
  263. int y = (u ^ c1) - c1;
  264. int z = (v ^ c1) - c1;
  265. g += x & c2;
  266. q += y & c2;
  267. r += z & c2;
  268. c1 &= c2;
  269. eta = (eta ^ c1) - (c1 + 1);
  270. f += g & c1;
  271. u += q & c1;
  272. v += r & c1;
  273. g >>= 1;
  274. u <<= 1;
  275. v <<= 1;
  276. }
  277. t[0] = u;
  278. t[1] = v;
  279. t[2] = q;
  280. t[3] = r;
  281. return eta;
  282. }
  283. private static int Divsteps30Var(int eta, int f0, int g0, int[] t)
  284. {
  285. int u = 1, v = 0, q = 0, r = 1;
  286. int f = f0, g = g0, m, w, x, y, z;
  287. int i = 30, limit, zeros;
  288. for (; ; )
  289. {
  290. // Use a sentinel bit to count zeros only up to i.
  291. zeros = Integers.NumberOfTrailingZeros(g | (-1 << i));
  292. g >>= zeros;
  293. u <<= zeros;
  294. v <<= zeros;
  295. eta -= zeros;
  296. i -= zeros;
  297. if (i <= 0)
  298. break;
  299. Debug.Assert((f & 1) == 1);
  300. Debug.Assert((g & 1) == 1);
  301. Debug.Assert((u * f0 + v * g0) == f << (30 - i));
  302. Debug.Assert((q * f0 + r * g0) == g << (30 - i));
  303. if (eta < 0)
  304. {
  305. eta = -eta;
  306. x = f; f = g; g = -x;
  307. y = u; u = q; q = -y;
  308. z = v; v = r; r = -z;
  309. // Handle up to 6 divsteps at once, subject to eta and i.
  310. limit = (eta + 1) > i ? i : (eta + 1);
  311. m = (int)((uint.MaxValue >> (32 - limit)) & 63U);
  312. w = (f * g * (f * f - 2)) & m;
  313. }
  314. else
  315. {
  316. // Handle up to 4 divsteps at once, subject to eta and i.
  317. limit = (eta + 1) > i ? i : (eta + 1);
  318. m = (int)((uint.MaxValue >> (32 - limit)) & 15U);
  319. w = f + (((f + 1) & 4) << 1);
  320. w = (-w * g) & m;
  321. }
  322. g += f * w;
  323. q += u * w;
  324. r += v * w;
  325. Debug.Assert((g & m) == 0);
  326. }
  327. t[0] = u;
  328. t[1] = v;
  329. t[2] = q;
  330. t[3] = r;
  331. return eta;
  332. }
  333. private static void Encode30(int bits, uint[] x, int xOff, int[] z, int zOff)
  334. {
  335. Debug.Assert(bits > 0);
  336. int avail = 0;
  337. ulong data = 0UL;
  338. while (bits > 0)
  339. {
  340. if (avail < System.Math.Min(30, bits))
  341. {
  342. data |= (x[xOff++] & M32UL) << avail;
  343. avail += 32;
  344. }
  345. z[zOff++] = (int)data & M30; data >>= 30;
  346. avail -= 30;
  347. bits -= 30;
  348. }
  349. }
  350. private static int EqualTo(int len, int[] x, int y)
  351. {
  352. int d = x[0] ^ y;
  353. for (int i = 1; i < len; ++i)
  354. {
  355. d |= x[i];
  356. }
  357. d = (int)((uint)d >> 1) | (d & 1);
  358. return (d - 1) >> 31;
  359. }
  360. private static int EqualToZero(int len, int[] x)
  361. {
  362. int d = 0;
  363. for (int i = 0; i < len; ++i)
  364. {
  365. d |= x[i];
  366. }
  367. d = (int)((uint)d >> 1) | (d & 1);
  368. return (d - 1) >> 31;
  369. }
  370. private static int GetMaximumDivsteps(int bits)
  371. {
  372. return (49 * bits + (bits < 46 ? 80 : 47)) / 17;
  373. }
  374. private static bool IsOne(int len, int[] x)
  375. {
  376. if (x[0] != 1)
  377. {
  378. return false;
  379. }
  380. for (int i = 1; i < len; ++i)
  381. {
  382. if (x[i] != 0)
  383. {
  384. return false;
  385. }
  386. }
  387. return true;
  388. }
  389. private static bool IsZero(int len, int[] x)
  390. {
  391. if (x[0] != 0)
  392. {
  393. return false;
  394. }
  395. for (int i = 1; i < len; ++i)
  396. {
  397. if (x[i] != 0)
  398. {
  399. return false;
  400. }
  401. }
  402. return true;
  403. }
  404. private static int Negate30(int len30, int[] D)
  405. {
  406. Debug.Assert(len30 > 0);
  407. Debug.Assert(D.Length >= len30);
  408. int c = 0, last = len30 - 1;
  409. for (int i = 0; i < last; ++i)
  410. {
  411. c -= D[i];
  412. D[i] = c & M30; c >>= 30;
  413. }
  414. c -= D[last];
  415. D[last] = c; c >>= 30;
  416. return c;
  417. }
  418. private static void UpdateDE30(int len30, int[] D, int[] E, int[] t, int m0Inv32, int[] M)
  419. {
  420. Debug.Assert(len30 > 0);
  421. Debug.Assert(D.Length >= len30);
  422. Debug.Assert(E.Length >= len30);
  423. Debug.Assert(M.Length >= len30);
  424. Debug.Assert(m0Inv32 * M[0] == 1);
  425. int u = t[0], v = t[1], q = t[2], r = t[3];
  426. int di, ei, i, md, me, mi, sd, se;
  427. long cd, ce;
  428. /*
  429. * We accept D (E) in the range (-2.M, M) and conceptually add the modulus to the input
  430. * value if it is initially negative. Instead of adding it explicitly, we add u and/or v (q
  431. * and/or r) to md (me).
  432. */
  433. sd = D[len30 - 1] >> 31;
  434. se = E[len30 - 1] >> 31;
  435. md = (u & sd) + (v & se);
  436. me = (q & sd) + (r & se);
  437. mi = M[0];
  438. di = D[0];
  439. ei = E[0];
  440. cd = (long)u * di + (long)v * ei;
  441. ce = (long)q * di + (long)r * ei;
  442. /*
  443. * Subtract from md/me an extra term in the range [0, 2^30) such that the low 30 bits of the
  444. * intermediate D/E values will be 0, allowing clean division by 2^30. The final D/E are
  445. * thus in the range (-2.M, M), consistent with the input constraint.
  446. */
  447. md -= (m0Inv32 * (int)cd + md) & M30;
  448. me -= (m0Inv32 * (int)ce + me) & M30;
  449. cd += (long)mi * md;
  450. ce += (long)mi * me;
  451. Debug.Assert(((int)cd & M30) == 0);
  452. Debug.Assert(((int)ce & M30) == 0);
  453. cd >>= 30;
  454. ce >>= 30;
  455. for (i = 1; i < len30; ++i)
  456. {
  457. mi = M[i];
  458. di = D[i];
  459. ei = E[i];
  460. cd += (long)u * di + (long)v * ei + (long)mi * md;
  461. ce += (long)q * di + (long)r * ei + (long)mi * me;
  462. D[i - 1] = (int)cd & M30; cd >>= 30;
  463. E[i - 1] = (int)ce & M30; ce >>= 30;
  464. }
  465. D[len30 - 1] = (int)cd;
  466. E[len30 - 1] = (int)ce;
  467. }
  468. private static void UpdateFG30(int len30, int[] F, int[] G, int[] t)
  469. {
  470. Debug.Assert(len30 > 0);
  471. Debug.Assert(F.Length >= len30);
  472. Debug.Assert(G.Length >= len30);
  473. int u = t[0], v = t[1], q = t[2], r = t[3];
  474. int fi, gi, i;
  475. long cf, cg;
  476. fi = F[0];
  477. gi = G[0];
  478. cf = (long)u * fi + (long)v * gi;
  479. cg = (long)q * fi + (long)r * gi;
  480. Debug.Assert(((int)cf & M30) == 0);
  481. Debug.Assert(((int)cg & M30) == 0);
  482. cf >>= 30;
  483. cg >>= 30;
  484. for (i = 1; i < len30; ++i)
  485. {
  486. fi = F[i];
  487. gi = G[i];
  488. cf += (long)u * fi + (long)v * gi;
  489. cg += (long)q * fi + (long)r * gi;
  490. F[i - 1] = (int)cf & M30; cf >>= 30;
  491. G[i - 1] = (int)cg & M30; cg >>= 30;
  492. }
  493. F[len30 - 1] = (int)cf;
  494. G[len30 - 1] = (int)cg;
  495. }
  496. }
  497. }
  498. #pragma warning restore
  499. #endif